Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Grid Computing with Security Assurance and Resource Optimization., and . ISCA PDCS, page 110-117. ISCA, (2004)Trusted P2P Transactions with Fuzzy Reputation Aggregation., , , and . IEEE Internet Comput., 9 (6): 24-34 (2005)DHT-based security infrastructure for trusted internet and grid computing., , , , , and . IJCIS, 2 (4): 412-433 (2006)A Highly Sensitive ELISA and Immunochromatographic Strip for the Detection of Salmonella typhimurium in Milk Samples., , , , , and . Sensors, 15 (3): 5281-5292 (2015)Efficient Velocity Estimation and Location Prediction in Underwater Acoustic Sensor Networks., , , , , and . IEEE Internet Things J., 9 (4): 2984-2998 (2022)Trusted Grid Computing with Security Binding and Trust Integration., , and . J. Grid Comput., 3 (1-2): 53-73 (2005)A Novel Attack Graph Posterior Inference Model Based on Bayesian Network., and . J. Information Security, 2 (1): 8-27 (2011)Fuzzy Trust Integration for Security Enforcement in Grid Computing., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 9-21. Springer, (2004)Selfish grid computing: game-theoretic modeling and NAS performance results., , and . CCGRID, page 1143-1150. IEEE Computer Society, (2005)Selfish Grids: Game-Theoretic Modeling and NAS/PSA Benchmark Evaluation., , and . IEEE Trans. Parallel Distrib. Syst., 18 (5): 621-636 (2007)